FREE TO VIEW


« Back to News

2024-02-12

Imran Khan Claims Victory Using AI Generated Video

Pakistan Election Turmoil: The imprisoned political leader appeared on an AI generated video to claim virtual victory following an Internet shutdown.

2024-02-12

Static Application Security Testing: Trends & Predictions For 2024

SAST: Finding security vulnerabilities in source code early in the development lifecycle, makes it easier and cheaper to fix any issues.

2024-02-09

Pakistan Mobile Internet Is Cut Off On Election Day

Law & Order: Pakistan's government has shut down mobile calls and data services as millions of people go to the polls to vote for a new government.

2024-02-09

Chinese Hacking Campaign Targets US Critical Infrastructure

Widespread Offensive Cyber Operations: Chinese hackers are implanting malware to disrupt daily life, were the US and China ever to go to war.

2024-02-09

Bolstering Resilience In The Age Of Expanding Threats

Prioritization: Amid the exponential rise in vulnerabilities the era of addressing every single vulnerability has become obsolete. By Howard Goodman

2024-02-07

Neuralink Implant A Brain Chip In A Human

A Brain - Computer Interface: Neuralink has implanted a wireless brain chip in a human for the first time aimed at restoring motor functionality.

2024-02-07

Healthcare Has Issues With Outsourced Cyber Security

Managed Service Providers Must Improve: Cyber security providers need to build trust and show that they “care” through closer collaboration.

2024-02-07

Supply Chain: AnyDesk Customers Affected By Credentials Breach

Remote desktop software maker AnyDesk detected a major breach, requiring them to revoke security-related certificates & systems for remediation.

2024-02-06

Ransomware: Businesses Are Well Equipped But Underprepared

Despite high-profile attacks targeting every industry, why are businesses still leaving themselves vulnerable to ransomware? By Duncan Bradley

2024-02-01

Cyber Attack On Georgia's State Government

The District Attorney's office prosecuting Donald Trump for electoral interference gets caught up in a cyber attack on the state government.

2024-02-05

Military Service Is An Ideal Background For A Cybersecurity Career

Addressing The Cybersecurity Talent Shortfall: Recruiters can tap into the rich diversity of skills offered by Armed Forces veterans. By Chip Daniels

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

TenIntelligence

TenIntelligence

TenIntelligence provides due diligence, brand protection and fraud investigation services including digital forensics.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

evoila

evoila

evoila GmbH is one of the leading providers in consulting, analysis, implementation and management of cloud infrastructure.

Mvine

Mvine

Mvine's primary business is authoring and selling Cyber-Secure Platforms for Collaboration Portals and for Identity Management as well as delivering cloud support services.

Calypso AI

Calypso AI

Calypso AI build software products that solve complex AI risks for national security and highly-regulated industries.

CYBRScore

CYBRScore

CYBRScore is a premium, performance-based cyber skills training and assessment provider that quantifies a user’s ability to defend a network.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Safe Systems

Safe Systems

Safe Systems provide compliance centric IT services for community banks and credit unions, ensuring that they are kept up to date on current technologies, security risks, and regulatory changes.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Phronesis Security

Phronesis Security

Phronesis Security is committed to delivering world-class cyber security consulting with a tangible social and environmental impact.

Transatlantic Cyber Security Business Network

Transatlantic Cyber Security Business Network

The Transatlantic Cyber Security Business Network is a coalition of UK and US cyber security companies which facilitates collaboration to help address critical cyber security challenges.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Third Wave Innovations

Third Wave Innovations

Third Wave Innovations (formerly RCS Secure) offers a full spectrum of cybersecurity safeguards and IT services.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.